First published: Sun Oct 16 2016(Updated: )
It was discovered that the Hotspot component of OpenJDK did not check types of System.arraycopy() function arguments src and dest in certain cases. An untrusted Java application or applet could use this flaw to corrupt virtual machine's memory and bypass Java sandbox restrictions.
Credit: secalert_us@oracle.com
Affected Software | Affected Version | How to fix |
---|---|---|
Oracle JDK 6 | =1.6.0-update121 | |
Oracle JDK 6 | =1.7.0-update111 | |
Oracle JDK 6 | =1.8.0-update101 | |
Oracle JDK 6 | =1.8.0-update102 | |
Oracle Java Runtime Environment (JRE) | =1.6.0-update121 | |
Oracle Java Runtime Environment (JRE) | =1.7.0-update111 | |
Oracle Java Runtime Environment (JRE) | =1.8.0-update101 | |
Oracle Java Runtime Environment (JRE) | =1.8.0-update102 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-5582 has a severity rating of high due to the potential for memory corruption and exploitation.
To fix CVE-2016-5582, users should update to the latest versions of Oracle JDK and JRE that address this vulnerability.
CVE-2016-5582 affects Oracle JDK versions 1.6.0-update121, 1.7.0-update111, and 1.8.0-update101 and 1.8.0-update102.
Yes, CVE-2016-5582 can be exploited remotely through an untrusted Java application or applet.
Exploiting CVE-2016-5582 could lead to memory corruption and allow attackers to bypass Java sandbox restrictions.